The usability of knowledge based authentication methods on mobile devices
Mobile devices are providing ever increasing functionality to users, and the risks associated with applications storing personal details are high. Graphical authentication methods have been shown to provide better security in terms of password space than traditional app... View more
Brown, A.S., Bracken, E., Zoccoli, S. & Douglas, K. (2004). Generating and remembering passwords. Applied Cognitive Psychology. 18 (6): 641-651.
Buchanan, G., Farrant, S., Jones, M., Thimbleby, H., Marsden, G. & Pazzani, M. (2001).
Improving Mobile Internet Usability. In: Proceedings of the 10th International Conference on the World Wide Web. WWW '01. Hong Kong, New York, NY, USA: ACM. pp. 673- 680.
Budgen, D. (2008). ASE-EVAL: Software Evaluation Glossary - Version 1.1. Available from: http://www.dur.ac.uk/ebse/resources/ASE-EVAL-glossary.pdf. [Accessed: 07/07/2010].
Buennemeyer, T.K., Nelson, T.M., Clagett, L.M., Dunning, J.P., Marchany, R.C. & Tront, J.G. (2008). Mobile Device Profiling and Intrusion Detection Using Smart Batteries. In: 41st Annual Hawaii International Conference on System Sciences. Waikoloa, Big Island, Hawaii, January 7-10, IEEE Computer Society. pp. 296-296.